全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

The Role of AI in Cyber Security: Safeguarding Digital Identity

DOI: 10.4236/jis.2024.152015, PP. 245-278

Keywords: Artificial Intelligence, Cyber Attack, Cyber Security, Real-Time Mitigation, Social Media Security, AI-Driven Threat Intelligence

Full-Text   Cite this paper   Add to My Lib

Abstract:

This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen or undermine infrastructural functions and organize the networks. In addition, the essay delves into AI’s role in Cyber security software development and the need for AI-resilient strategies that could anticipate and thwart AI-created vulnerabilities. The document also touched on the socioeconomic ramifications of the emergence of AI in Cyber security as well. Looking into AI and security literature, the report outlines benefits including made threat detection precision, extended security ops efficiency, and preventive security tasks. At the same time, it emphasizes the positive side of AI, but it also shows potential limitations such as data bias, lack of interpretability, ethical concerns, and security flaws. The work similarly focuses on the characterized of misuse and sophisticated cyberattacks. The research suggests ways to diminish AI-generating maleficence which comprise ethical AI development, robust safety measures and constant audits and updates. With regard to the AI application in Cyber security, there are both pros and cons in terms of socio-economic issues, for example, job displacement, economic growth and the change in the required workforce skills.

References

[1]  Ness, S., Shepherd, N.J. and Xuan, T.R. (2023) Synergy between AI and Robotics: A Comprehensive Integration. Asian Journal of Research in Computer Science, 16, 80-94.
https://doi.org/10.9734/ajrcos/2023/v16i4372
[2]  Khinvasara, T., Ness, S. and Tzenios, N. (2023) Risk Management in Medical Device Industry. Journal of Engineering Research and Reports, 25, 130-140.
https://doi.org/10.9734/jerr/2023/v25i8965
[3]  Xuan, T. and Ness, S. (2023) Integration of Blockchain and AI: Exploring Application in the Digital Business. Journal of Engineering Research and Reports, 25, 20-39.
https://doi.org/10.9734/jerr/2023/v25i8955
[4]  Nasnodkar, S., Cinar, B. and Ness, S. (2023) Artificial Intelligence in Toxicology and Pharmacology. Journal of Engineering Research and Reports, 25, 192-206.
https://doi.org/10.9734/jerr/2023/v25i7952
[5]  Capuano, N., Fenza, G., Loia V. and Stanzione, C. (2022) Explainable Artificial Intelligence in CyberSecurity: A Survey. IEEE Access, 10, 93575-93600.
https://doi.org/10.1109/ACCESS.2022.3204171
[6]  Edu, J.S., Such, J.M. and Suarez-Tangil, G. (2020) Smart Home Personal Assistants: A Security and Privacy Review. ACM Computing Surveys, 53, Article No. 116.
https://doi.org/10.1145/3412383
[7]  Gupta, M., Akiri, C., Aryal, K., Parker, E. and Praharaj, L. (2023) From ChatGPT to ThreatGPT: Impact of Generative AI in Cyber Security and Privacy. IEEE Access, 11, 80218-80245.
https://doi.org/10.1109/ACCESS.2023.3300381
[8]  Budzinski, O., Noskova, V. and Zhang, X. (2019) The Brave New World of Digital Personal Assistants: Benefits and Challenges from an Economic Perspective. NETNOMICS: Economic Research and Electronic Networking, 20, 177-194.
https://doi.org/10.1007/s11066-019-09133-4
[9]  Hussain, S., Neekhara, P., Jere, M., Koushanfar, F. and McAuley, J. (2021) Adversarial Deepfake: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples. 2021 IEEE Winter Conference on Applications of Computer Vision (WACV), Waikoloa, 3-8 January 2021, 3347-3356.
https://doi.org/10.1109/WACV48630.2021.00339
[10]  Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z. and Kifayat, K. (2021) A Comprehensive Survey of AI-Enabled Phishing Attacks Detection Techniques. Telecommunication Systems, 76, 139-154.
https://doi.org/10.1007/s11235-020-00733-2
[11]  Hitaj, B., Ateniese, G. and Perez-Cruz, F. (2017) Deep Models under the GAN: Information Leakage from Collaborative Deep Learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, 30 October-3 November 2017, 603-618.
https://doi.org/10.1145/3133956.3134012
[12]  Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G. and Qiu, M. (2020) Adversarial Attacks against Network Intrusion Detection in IoT Systems. IEEE Internet of Things Journal, 8, 10327-10335.
https://doi.org/10.1109/JIOT.2020.3048038
[13]  Rosenberg, I., Shabtai, A., Elovici, Y. and Rokach, L. (2021) Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Computing Surveys, 54, Article No. 108.
https://doi.org/10.1145/3453158
[14]  Abdelkhalek, M., Ravikumar, G. and Govindarasu, M. (2022) ML-Based Anomaly Detection System for DER Communication in Smart Grid. 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), New Orleans, 24-28 April 2022, 1-5.
https://doi.org/10.1109/ISGT50606.2022.9817481
[15]  Mehedi, S.T., Anwar, A., Rahman, Z., Ahmed, K. and Islam, R. (2022) Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. IEEE Transactions on Industrial Informatics, 19, 1006-1017.
https://doi.org/10.1109/TII.2022.3164770
[16]  Li, Z., Zeng, J., Chen, Y. and Liang, Z. (2022) AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. Computer Security-ESORICS 2022, Copenhagen, 26-30 September 2022, 589-609.
https://doi.org/10.1007/978-3-031-17140-6_29
[17]  Devi Priya, V.S. and Chakkaravarthy, S.S. (2023) Containerized Cloud Based Honeypot Deception for Tracking Attackers. Scientific Reports, 13, Article No. 1437.
https://doi.org/10.1038/s41598-023-28613-0
[18]  Skulimowski, A.M.J. and Łydek, P. (2022) Adaptive Design of a Cyber-Physical System for Industrial Risk Management Decision Support. 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore, 11-13 December 2022, 90-97.
https://doi.org/10.1109/ICARCV57592.2022.10004251
[19]  Ansari, M.F., Sharma, P.K. and Dash, B. (2022) Prevention of Phishing Attacks Using AI-Based Cyber Security Awareness Training. International Journal of Smart Sensor and Adhoc Network, 3, 61-72.
https://doi.org/10.47893/IJSSAN.2022.1221
[20]  Chandre, P.R., Mahalle, P. and Shinde, G. (2022) Intrusion Prevention System Using Convolutional Neural Network for Wireless Sensor Network. International Journal of Artificial Intelligence, 11, 504-515.
https://doi.org/10.11591/ijai.v11.i2.pp504-515
[21]  Elhadad, A., Alanazi, F., Taloba, A.I., Abozeid, A., et al. (2022) Fog Computing Service in the Healthcare Monitoring System for Managing the Real-Time Notification. Journal of Healthcare Engineering, 2022, Article ID: 5337733.
https://doi.org/10.1155/2022/5337733
[22]  Mukherjee, P., Pradhan, C., Tripathy, H.K. and Gaber, T. (2023) Kryptoschain—A Blockchain-Inspired, AI-Combined, DNA-Encrypted Secure Information Exchange Scheme. Electronics, 12, Article 493.
https://doi.org/10.3390/electronics12030493
[23]  Stergiou, C.L. and Psannis, K.E. (2022) Digital Twin Intelligent System for Industrial Iot-Based Big Data Management and Analysis in Cloud. Virtual Reality & Intelligent Hardware, 4, 279-291.
https://doi.org/10.1016/j.vrih.2022.05.003
[24]  Hassan, S., Wang, J., Kontovas, C. and Bashir, M. (2022) Modified FMEA Hazard Identification for Cross-Country Petroleum Pipeline Using Fuzzy Rule Base and Approximate Reasoning. Journal of Loss Prevention in the Process Industries, 74, Article 104616.
https://doi.org/10.1016/j.jlp.2021.104616
[25]  Waleed, A., Jamali, A.F. and Masood, A. (2022) Which Open-Source IDS? Snort, Suricata or Zeek. Computer Networks, 213, Article 109116.
https://doi.org/10.1016/j.comnet.2022.109116
[26]  Malek, Z.S., Trivedi, B. and Shah, A. (2020) User Behavior Pattern-Signature Based Intrusion Detection. 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 27-28 July 2020, 549-552.
https://doi.org/10.1109/WorldS450073.2020.9210368
[27]  Ferrag, M.A., Maglaras, L., Ahmim, A., Derdour, M. and Janicke, H. (2020) RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12, Article 44.
https://doi.org/10.3390/fi12030044
[28]  Tripathi, K.P. (2011) A Review on Knowledge-Based Expert System: Concept and Architecture. IJCA Special Issue on Artificial Intelligence Techniques Novel Approaches & Practical Applications, 4, 19-23.
[29]  Sarker, P.S., Rafy, F., Srivastava, A.K. and Singh, R.K. (2023) Cyber Anomaly-Aware Distributed Voltage Control with Active Power Curtailment and DERs. IEEE Transactions on Industry Applications, 60, 1622-1633.
https://doi.org/10.1109/TIA.2023.3328850
[30]  Kim, J., Kim, J. Le, H., Thu, T. and Kim, H. (2016) Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection. 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, 15-17 February 2016, 1-5.
https://doi.org/10.1109/PlatCon.2016.7456805
[31]  Yin, C., Zhu, Y., Fei, J. and He, X. (2017) A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access, 5, 21954-21961.
https://doi.org/10.1109/ACCESS.2017.2762418
[32]  Diro, A.A. and Chilamkurti, N. (2018) Distributed Attack Detection Scheme Using Deep Learning Approach for Internet of Things. Future Generation Computer Systems, 82, 761-768.
https://doi.org/10.1016/j.future.2017.08.043
[33]  Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M. and El Moussa, F. (2020) DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking. Electronics, 9, Article 1533.
https://doi.org/10.3390/electronics9091533
[34]  Xiao, K.H., Wu, E., Guo, J., Xu, C. and Wang, Y. (2021) Transformer in Transformer. Advances in Neural Information Processing Systems, 34, 15908-15919.
[35]  Du, S., Lee, J., Tian, Y., Singh, A. and Poczos, B. (2018) Gradient Descent Learns One-Hidden-Layer CNN: Don’t be Afraid of Spurious Local Minima. Proceedings of the 35th International Conference on Machine Learning, Stockholm, 10-15 July 2018, 1339-1348.
[36]  Kriegeskorte, N. and Golan, T. (2019) Neural Network Models and Deep Learning. Current Biology, 29, R231-R236.
https://doi.org/10.1016/j.cub.2019.02.034
[37]  Bui, D.T., Tsangaratos, P., Nguyen, V.-T., Liem, N.V. and Trinh, P.T. (2020) Comparing the Prediction Performance of a Deep Learning Neural Network Model with Conventional Machine Learning Models in Landslide Susceptibility Assessment. CATENA, 188, Article 104426.
https://doi.org/10.1016/j.catena.2019.104426
[38]  Sarker, I.H., Abushark, Y.B., Alsolami, F. and Khan, A.I. (2020) IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry, 12, Article 754.
https://doi.org/10.3390/sym12050754
[39]  Srinidhi, C.L., Ciga, O. and Martel, A.L. (2021) Deep Neural Network Models for Computational Histopathology: A Survey. Medical Image Analysis, 67, Article 101813.
https://doi.org/10.1016/j.media.2020.101813
[40]  Wang, H., Lei, Z., Zhang, X., Zhou, B. and Peng, J. (2016) Machine Learning Basics. Deep Learning, 1, 98-164.
[41]  Wu, Z., Zhang, H., Wang, P. and Sun, Z. (2022) RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System. IEEE Access, 10, 64375-64387.
https://doi.org/10.1109/ACCESS.2022.3182333
[42]  Rieck, K., Trinius, P., Willems, C. and Holz, T. (2011) Automatic Analysis of Malware Behavior Using Machine Learning. Journal of Computer Security, 19, 639-668.
https://doi.org/10.3233/JCS-2010-0410
[43]  Costa, P.C.G., Laskey, K.B. and Alghamdi, G. (2006) Bayesian Ontologies in AI Systems.
https://www.academia.edu/66571238/Bayesian_ontologies_in_AI_systems?auto=download
[44]  Manikopoulos, C. and Papavassiliou, S. (2002) Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine, 40, 76-82.
https://doi.org/10.1109/MCOM.2002.1039860
[45]  Stuart, J.A. and Owens, J.D. (2011) Multi-GPU MapReduce on GPU Clusters. 2011 IEEE International Parallel & Distributed Processing Symposium, Anchorage, 16-20 May 2011, 1068-1079.
https://doi.org/10.1109/IPDPS.2011.102

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133